Game theory for cyber deception: from theory to applications
This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the cont...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Birkhäuser
2021
|
Ausgabe: | 1st ed. 2021 |
Schriftenreihe: | Static & Dynamic Game Theory: Foundations & Applications
|
Schlagworte: | |
Zusammenfassung: | This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field.The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception.Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory |
Beschreibung: | Part I Fundamentals.- Introduction.- Nash and Stackelberg Games.- Introduction to Incomplete Information.- Part II Defensive Deception.- A Taxonomy of Defensive Deception.- Obfuscation.- Honey-X.- Attacker Engagement.- Part III Mitigation of Malicious Deception.- Strategic Trust.- Active Crowd Defense.- Part IV Challenges and Opportunities in Cyber Deception.- Insights and Future Directions.- Current Challenges in Cyber Deception |
Beschreibung: | xiii, 190 Seiten Illustrationen, Diagramme 320 grams |
ISBN: | 9783030660673 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV048210297 | ||
003 | DE-604 | ||
005 | 20220621 | ||
007 | t | ||
008 | 220510s2021 a||| |||| 00||| eng d | ||
020 | |a 9783030660673 |9 978-3-030-66067-3 | ||
024 | 3 | |a 9783030660673 | |
035 | |a (OCoLC)1334041703 | ||
035 | |a (DE-599)BVBBV048210297 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-29T | ||
100 | 1 | |a Pawlick, Jeffrey |e Verfasser |4 aut | |
245 | 1 | 0 | |a Game theory for cyber deception |b from theory to applications |c Jeffrey Pawlick, Quanyan Zhu |
250 | |a 1st ed. 2021 | ||
264 | 1 | |a Cham |b Birkhäuser |c 2021 | |
300 | |a xiii, 190 Seiten |b Illustrationen, Diagramme |c 320 grams | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Static & Dynamic Game Theory: Foundations & Applications | |
500 | |a Part I Fundamentals.- Introduction.- Nash and Stackelberg Games.- Introduction to Incomplete Information.- Part II Defensive Deception.- A Taxonomy of Defensive Deception.- Obfuscation.- Honey-X.- Attacker Engagement.- Part III Mitigation of Malicious Deception.- Strategic Trust.- Active Crowd Defense.- Part IV Challenges and Opportunities in Cyber Deception.- Insights and Future Directions.- Current Challenges in Cyber Deception | ||
520 | |a This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field.The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception.Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory | ||
650 | 4 | |a bicssc | |
650 | 4 | |a bisacsh | |
650 | 4 | |a Data protection | |
650 | 4 | |a Computer science—Mathematics | |
653 | |a Hardcover, Softcover / Mathematik/Sonstiges | ||
700 | 1 | |a Zhu, Quanyan |e Sonstige |0 (DE-588)1012966704 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-030-66065-9 |
999 | |a oai:aleph.bib-bvb.de:BVB01-033591156 |
Datensatz im Suchindex
_version_ | 1804183982555791360 |
---|---|
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Pawlick, Jeffrey |
author_GND | (DE-588)1012966704 |
author_facet | Pawlick, Jeffrey |
author_role | aut |
author_sort | Pawlick, Jeffrey |
author_variant | j p jp |
building | Verbundindex |
bvnumber | BV048210297 |
ctrlnum | (OCoLC)1334041703 (DE-599)BVBBV048210297 |
edition | 1st ed. 2021 |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03190nam a2200397 c 4500</leader><controlfield tag="001">BV048210297</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20220621 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">220510s2021 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030660673</subfield><subfield code="9">978-3-030-66067-3</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783030660673</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1334041703</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV048210297</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-29T</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pawlick, Jeffrey</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Game theory for cyber deception</subfield><subfield code="b">from theory to applications</subfield><subfield code="c">Jeffrey Pawlick, Quanyan Zhu</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st ed. 2021</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Birkhäuser</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xiii, 190 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield><subfield code="c">320 grams</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Static & Dynamic Game Theory: Foundations & Applications</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Part I Fundamentals.- Introduction.- Nash and Stackelberg Games.- Introduction to Incomplete Information.- Part II Defensive Deception.- A Taxonomy of Defensive Deception.- Obfuscation.- Honey-X.- Attacker Engagement.- Part III Mitigation of Malicious Deception.- Strategic Trust.- Active Crowd Defense.- Part IV Challenges and Opportunities in Cyber Deception.- Insights and Future Directions.- Current Challenges in Cyber Deception</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field.The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception.Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bicssc</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer science—Mathematics</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Hardcover, Softcover / Mathematik/Sonstiges</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Zhu, Quanyan</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)1012966704</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-030-66065-9</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-033591156</subfield></datafield></record></collection> |
id | DE-604.BV048210297 |
illustrated | Illustrated |
index_date | 2024-07-03T19:48:21Z |
indexdate | 2024-07-10T09:32:06Z |
institution | BVB |
isbn | 9783030660673 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-033591156 |
oclc_num | 1334041703 |
open_access_boolean | |
owner | DE-29T |
owner_facet | DE-29T |
physical | xiii, 190 Seiten Illustrationen, Diagramme 320 grams |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Birkhäuser |
record_format | marc |
series2 | Static & Dynamic Game Theory: Foundations & Applications |
spelling | Pawlick, Jeffrey Verfasser aut Game theory for cyber deception from theory to applications Jeffrey Pawlick, Quanyan Zhu 1st ed. 2021 Cham Birkhäuser 2021 xiii, 190 Seiten Illustrationen, Diagramme 320 grams txt rdacontent n rdamedia nc rdacarrier Static & Dynamic Game Theory: Foundations & Applications Part I Fundamentals.- Introduction.- Nash and Stackelberg Games.- Introduction to Incomplete Information.- Part II Defensive Deception.- A Taxonomy of Defensive Deception.- Obfuscation.- Honey-X.- Attacker Engagement.- Part III Mitigation of Malicious Deception.- Strategic Trust.- Active Crowd Defense.- Part IV Challenges and Opportunities in Cyber Deception.- Insights and Future Directions.- Current Challenges in Cyber Deception This book introduces game theory as a means to conceptualize, model, and analyze cyber deception. Drawing upon a collection of deception research from the past 10 years, the authors develop a taxonomy of six species of defensive cyber deception. Three of these six species are highlighted in the context of emerging problems such as privacy against ubiquitous tracking in the Internet of things (IoT), dynamic honeynets for the observation of advanced persistent threats (APTs), and active defense against physical denial-of-service (PDoS) attacks. Because of its uniquely thorough treatment of cyber deception, this book will serve as a timely contribution and valuable resource in this active field.The opening chapters introduce both cybersecurity in a manner suitable for game theorists and game theory as appropriate for cybersecurity professionals. Chapter Four then guides readers through the specific field of defensive cyber deception. A key feature of the remaining chapters is the development of a signaling game model for the species of leaky deception featured in honeypots and honeyfiles. This model is expanded to study interactions between multiple agents with varying abilities to detect deception.Game Theory for Cyber Deception will appeal to advanced undergraduates, graduate students, and researchers interested in applying game theory to cybersecurity. It will also be of value to researchers and professionals working on cybersecurity who seek an introduction to game theory bicssc bisacsh Data protection Computer science—Mathematics Hardcover, Softcover / Mathematik/Sonstiges Zhu, Quanyan Sonstige (DE-588)1012966704 oth Erscheint auch als Online-Ausgabe 978-3-030-66065-9 |
spellingShingle | Pawlick, Jeffrey Game theory for cyber deception from theory to applications bicssc bisacsh Data protection Computer science—Mathematics |
title | Game theory for cyber deception from theory to applications |
title_auth | Game theory for cyber deception from theory to applications |
title_exact_search | Game theory for cyber deception from theory to applications |
title_exact_search_txtP | Game theory for cyber deception from theory to applications |
title_full | Game theory for cyber deception from theory to applications Jeffrey Pawlick, Quanyan Zhu |
title_fullStr | Game theory for cyber deception from theory to applications Jeffrey Pawlick, Quanyan Zhu |
title_full_unstemmed | Game theory for cyber deception from theory to applications Jeffrey Pawlick, Quanyan Zhu |
title_short | Game theory for cyber deception |
title_sort | game theory for cyber deception from theory to applications |
title_sub | from theory to applications |
topic | bicssc bisacsh Data protection Computer science—Mathematics |
topic_facet | bicssc bisacsh Data protection Computer science—Mathematics |
work_keys_str_mv | AT pawlickjeffrey gametheoryforcyberdeceptionfromtheorytoapplications AT zhuquanyan gametheoryforcyberdeceptionfromtheorytoapplications |